{"id":242861,"date":"2025-01-26T14:41:08","date_gmt":"2025-01-26T14:41:08","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/"},"modified":"2025-01-26T14:41:08","modified_gmt":"2025-01-26T14:41:08","slug":"employee-cyber-security-training","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/","title":{"rendered":"5 Essential Components of Effective Employee Cyber Security Training"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the realm of <strong>cybersecurity<\/strong>, the <strong>leaked password<\/strong> &#034;123456&#034; has become infamous, appearing in numerous <strong>data breaches<\/strong> and leaks across various online platforms. This seemingly innocuous combination has often topped lists of the most commonly compromised passwords, highlighting the alarming reality that many users opt for simplicity over security. Its significance lies in the fact that it serves as a stark reminder of the vulnerabilities associated with <strong>weak passwords<\/strong>, underscoring the importance of robust <strong>password management practices<\/strong> for individuals and organizations alike. For users, the prevalence of such leaks reinforces the need for vigilance and proactive measures to safeguard their digital identities.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Building_a_Strong_Foundation_With_Baseline_Assessments\" >Building a Strong Foundation With Baseline Assessments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Role-Specific_Training_and_Real-World_Scenarios\" >Role-Specific Training and Real-World Scenarios<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Interactive_Learning_Methods_and_Gamification\" >Interactive Learning Methods and Gamification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Creating_a_Culture_of_Cybersecurity_Awareness\" >Creating a Culture of Cybersecurity Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Measuring_Success_and_Continuous_Program_Evolution\" >Measuring Success and Continuous Program Evolution<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#How_Do_Employees_Maintain_Cybersecurity_Practices_When_Working_From_Home\" >How Do Employees Maintain Cybersecurity Practices When Working From Home?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#What_Immediate_Steps_Should_Employees_Take_if_They_Suspect_a_Security_Breach\" >What Immediate Steps Should Employees Take if They Suspect a Security Breach?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#Can_Personal_Devices_Be_Safely_Used_for_Work-Related_Tasks\" >Can Personal Devices Be Safely Used for Work-Related Tasks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#How_Often_Should_Employees_Change_Their_Passwords_Across_Different_Work_Platforms\" >How Often Should Employees Change Their Passwords Across Different Work Platforms?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#What_Are_the_Consequences_for_Employees_Who_Repeatedly_Fail_Security_Compliance_Tests\" >What Are the Consequences for Employees Who Repeatedly Fail Security Compliance Tests?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/employee-cyber-security-training\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Regular baseline assessments measure employee understanding and identify knowledge gaps in cyber security fundamentals.<\/li>\n<li>Role-specific training programs ensure employees learn security practices relevant to their specific job responsibilities.<\/li>\n<li>Interactive learning through gamification increases engagement and retention of essential security concepts and practices.<\/li>\n<li>Building a security-aware culture through leadership support, teamwork, and recognition of good security practices.<\/li>\n<li>Continuous measurement and program evolution using quizzes, simulations, and feedback to maintain training effectiveness.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Building_a_Strong_Foundation_With_Baseline_Assessments\"><\/span>Building a Strong Foundation With Baseline Assessments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/baseline_assessments_for_growth.jpg\" alt=\"baseline assessments for growth\" title=\"\"><\/div>\n<p>When we want to make our computers and information super safe, we first need to figure out what everyone already knows! Think of it like giving a quiz to see who remembers the rules of a fun game.<\/p>\n<p>I&#039;ll help you understand what <strong>baseline assessments<\/strong> are &#8211; they&#039;re like a <strong>cyber security report card<\/strong>! We look at things like how well you spot tricky emails (phishing), create <strong>strong passwords<\/strong>, and keep private information safe. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">Multi-Factor Authentication (MFA)<\/a> plays a crucial role in enhancing security and could be a key topic to assess in your training.<\/p>\n<p>Have you ever played &#034;spot the difference&#034; games? That&#039;s what we&#039;re doing here, but with computer safety! <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.itsasap.com\/blog\/cybersecurity-awareness-training-features\">Regular quizzes<\/a> and simulations help track how well employees understand cyber threats.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Role-Specific_Training_and_Real-World_Scenarios\"><\/span>Role-Specific Training and Real-World Scenarios<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like how your favorite superhero has special powers for different missions, employees need special <strong>cyber security training<\/strong> for their jobs too!<\/p>\n<p>Think about it &#8211; would Spider-Man need the same training as Iron Man? Of course not!<\/p>\n<p>I&#039;ll tell you a secret: <strong>different jobs<\/strong> face different cyber bad guys. It&#039;s like having <strong>special shields<\/strong> for different types of attacks! With <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/keepnetlabs.com\/blog\/how-to-implement-role-based-security-awareness-training\">tailored security training<\/a>, organizations can reduce data breaches that cost millions.<\/p>\n<p>For example, people who work with money need to learn about keeping bank information safe, while computer programmers learn how to write super-secure code. Isn&#039;t that cool?<\/p>\n<p>We make the training fun by creating pretend situations &#8211; like a game where you spot <strong>fake emails<\/strong> from tricky hackers!<\/p>\n<p>Have you ever played &#034;spot the difference&#034; games? It&#039;s just like that, but we&#039;re catching <strong>cyber villains<\/strong> instead!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Interactive_Learning_Methods_and_Gamification\"><\/span>Interactive Learning Methods and Gamification<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/engaging_educational_techniques_combined.jpg\" alt=\"engaging educational techniques combined\" title=\"\"><\/div>\n<p>Everyone loves playing games, and learning about <strong>cyber security<\/strong> can be just as fun!<\/p>\n<p>I&#039;ve discovered that turning security training into an exciting game makes it easier to remember important stuff. You know how you earn points in video games? Well, in cyber security training, you can <strong>earn badges and points<\/strong> for spotting fake emails (we call those &#034;phishing&#034;) and keeping your passwords super strong. Incorporating <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">multi-factor authentication<\/a> into training scenarios can also improve understanding of essential security measures.<\/p>\n<p>Want to know something cool? When companies make their <strong>training fun<\/strong> like this, people learn <strong>60% better<\/strong>!<\/p>\n<p>It&#039;s like turning boring homework into an adventure game. You get to solve puzzles, compete with friends, and even practice defending against pretend cyber bad guys. <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/flearningstudio.com\/cyber-security-training-for-employees\/\">Gamified learning experiences<\/a> have proven to enhance engagement and motivation among employees while building long-term security awareness.<\/p>\n<p>Have you ever played <strong>capture the flag<\/strong>? We do that too, but with cyber security challenges!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Creating_a_Culture_of_Cybersecurity_Awareness\"><\/span>Creating a Culture of Cybersecurity Awareness<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Building a strong <strong>cyber security culture<\/strong> is like growing a garden &#8211; it needs everyone&#039;s help to bloom!<\/p>\n<p>Just like how you work with your friends on the playground, keeping your company safe from cyber bad guys takes <strong>teamwork<\/strong>.<\/p>\n<p>I&#039;ll let you in on a secret &#8211; it starts with the grown-ups in charge! They&#039;re like team captains who show everyone that cyber security is super important.<\/p>\n<p>They make sure there&#039;s enough time and money for fun <strong>training games<\/strong> and activities.<\/p>\n<p>You know how you practice catching a ball? Well, employees practice spotting <strong>tricky emails<\/strong> and keeping passwords safe through cool hands-on activities. Regular <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/kraftbusiness.com\/blog\/culture-of-cybersecurity-awareness\/\">phishing simulation tests<\/a> help employees stay sharp and ready to spot dangers.<\/p>\n<p>To further enhance security, it&#039;s vital for employees to understand the concept of <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-fatigue-mitre\/\">MFA fatigue<\/a>, as it can lead to complacency in protecting sensitive information.<\/p>\n<p>When someone does a great job protecting the company, they get <strong>special recognition<\/strong> &#8211; just like earning a gold star in class!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Measuring_Success_and_Continuous_Program_Evolution\"><\/span>Measuring Success and Continuous Program Evolution<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/success_metrics_and_adaptation.jpg\" alt=\"success metrics and adaptation\" title=\"\"><\/div>\n<p>While superheroes protect cities from bad guys, we need <strong>special tools<\/strong> to protect our cyber training too! I use <strong>fun quizzes<\/strong> before and after training to see how much you&#039;ve learned &#8211; just like leveling up in a video game!<\/p>\n<p>Regular <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.micromindercs.com\/blog\/effectiveness-of-security-awareness-training\">employee feedback surveys<\/a> help maintain and improve our security awareness programs.<\/p>\n<p>You know what&#039;s super cool? I send out <strong>pretend phishing emails<\/strong> (those are the tricky ones from bad guys) to see if you can spot them. It&#039;s like playing detective!<\/p>\n<p>I also keep track of how many <strong>cyber accidents<\/strong> happen, just like counting how many times you&#039;ve cleaned your room this week.<\/p>\n<p>What&#039;s really awesome is when you tell me what you think about the training. Did you like the games? Were the lessons too hard or too easy? <strong>Your feedback<\/strong> helps me make everything better, like adjusting a recipe until the cookies taste just right!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_Employees_Maintain_Cybersecurity_Practices_When_Working_From_Home\"><\/span>How Do Employees Maintain Cybersecurity Practices When Working From Home?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I keep my home office super-safe by following some simple rules!<\/p>\n<p>I always use <strong>strong passwords<\/strong> (like mixing up letters and numbers), and I connect through a special tunnel called a <strong>VPN<\/strong>. It&#039;s like having a secret code with my work friends!<\/p>\n<p>I make sure my <strong>Wi-Fi is locked tight<\/strong>, keep my computer updated, and never share work stuff on personal devices.<\/p>\n<p>Think of it like keeping your lunch box just for your lunch!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Immediate_Steps_Should_Employees_Take_if_They_Suspect_a_Security_Breach\"><\/span>What Immediate Steps Should Employees Take if They Suspect a Security Breach?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you suspect a <strong>security breach<\/strong>, don&#039;t panic!<\/p>\n<p>I&#039;ll tell you exactly what to do. First, stop what you&#039;re doing and <strong>disconnect your computer<\/strong> from the internet &#8211; just like pulling the plug on a game!<\/p>\n<p>Then, tell your team leader right away. Write down everything strange you noticed, like weird pop-ups or slow programs.<\/p>\n<p>Finally, <strong>don&#039;t delete anything<\/strong> &#8211; those clues help catch the bad guys!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Personal_Devices_Be_Safely_Used_for_Work-Related_Tasks\"><\/span>Can Personal Devices Be Safely Used for Work-Related Tasks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you a secret about using your <strong>personal phone or tablet<\/strong> for work &#8211; it&#039;s like sharing your favorite toy with everyone!<\/p>\n<p>While it&#039;s possible to use personal devices safely, you&#039;ll need some <strong>special safety rules<\/strong>.<\/p>\n<p>Think of it like wearing a helmet when riding your bike. You&#039;ll want to use special passwords, <strong>keep your device updated<\/strong> (like getting new batteries), and always tell a grown-up if something seems weird.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Employees_Change_Their_Passwords_Across_Different_Work_Platforms\"><\/span>How Often Should Employees Change Their Passwords Across Different Work Platforms?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend changing your <strong>work passwords<\/strong> only once a year, unless there&#039;s been a <strong>security breach<\/strong>.<\/p>\n<p>Here&#039;s why: changing passwords too often can make you tired of creating new ones, leading to weak variations like &#034;Password1&#034; becoming &#034;Password2.&#034;<\/p>\n<p>Instead, I suggest using a <strong>password manager<\/strong> to create strong, unique passwords for each platform.<\/p>\n<p>It&#039;s like having a special safe for all your digital keys!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Are_the_Consequences_for_Employees_Who_Repeatedly_Fail_Security_Compliance_Tests\"><\/span>What Are the Consequences for Employees Who Repeatedly Fail Security Compliance Tests?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what happens when employees keep failing their <strong>security tests<\/strong> &#8211; it&#039;s like getting a time-out, but for grown-ups!<\/p>\n<p>First, they&#039;ll need <strong>extra training<\/strong> (like learning new games). If they still don&#039;t improve, they might lose some computer privileges or face disciplinary action.<\/p>\n<p>In serious cases, they could even lose their job. Just like when you break playground rules, there are <strong>consequences to keep everyone safe<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you embrace the essential components of <strong>effective cybersecurity training<\/strong>, it&#039;s crucial to extend that knowledge to one of the most fundamental aspects of online safety: <strong>password security<\/strong>. Strong passwords are your first line of defense against cyber threats, but managing them can be a challenge. This is where <strong>password management<\/strong> and <strong>passkey management<\/strong> come into play, ensuring that your credentials are both secure and easily accessible.<\/p>\n<p>Don&#039;t leave your digital safety to chance. Take proactive steps to protect yourself and your organization by utilizing robust password management tools. I encourage you to explore LogMeOnce, a comprehensive solution designed to simplify your password management while enhancing security. Sign up for a free account today and experience the peace of mind that comes with knowing your passwords are secure. Visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and start your journey towards stronger password security now!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Transform your company&#8217;s cyber security culture with these proven training elements that strengthen your digital defense against evolving threats.<\/p>\n","protected":false},"author":5,"featured_media":242860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[1740,22483,26535],"class_list":["post-242861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-cyber-security","tag-digital-defense","tag-employee-training"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=242861"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242861\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/242860"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=242861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=242861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=242861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}